article thumbnail

Cybersecurity Insights with Contrast CISO David Lindner | 4/19/24

Security Boulevard

If you’re not using basic measures like password managers, two-factor authentication (2FA) and cybersecurity training, you’re risking more than you might realize. The post Cybersecurity Insights with Contrast CISO David Lindner | 4/19/24 appeared first on Security Boulevard.

CISO 113
article thumbnail

NIST Password Guidelines 2021: Challenging Traditional Password Management

Security Boulevard

In 2017, the National Institute of Standards and Technology (NIST) released NIST Special Publication 800-63B Digital Identity Guidelines to help organizations properly comprehend and address risk as it relates to password management on the part of end users.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

NEW TECH: Devolutions’ ‘PAM’ solution helps SMBs deal with rising authentication risks

The Last Watchdog

I spoke with Maurice Côté, VP Business Solutions, and Martin Lemay, CISO, of Devolutions , at the RSA 2020 Conference in San Francisco recently. Devolutions is a Montreal, Canada-based company that provides remote connection in addition to password and privileged access management (PAM) solutions to SMBs. I’ll keep watch.

article thumbnail

Episode 243: The CSTO is a thing- a conversation with Chris Hoff of LastPass

The Security Ledger

at the password management firm LastPass, what the CSTO role entails and how companies need to do more to confront the security implications of “software eating the world.” Prior to that, Chris was the head of BoA’s “Never Down” Critical Business Services group and a former CISO at Citadel. .

CISO 52
article thumbnail

3 Steps to Prevent a Case of Compromised Credentials

Duo's Security Blog

The answer, like most other cybersecurity-adjacent answers, lies in a combination of factors including social engineering , weak passwords, and other risky security moves or attacks. User-generated passwords can be deceptively weak, with less caution given to password management as remote and hybrid work become more common.

article thumbnail

Don’t Bet on Passwords: Using MFA to Make Insuring Your Security Less of a Gamble

Duo's Security Blog

By this point, we’re all familiar with the list of requirements for a strong password: unique, long, memorable, free from any personal information… But even the strongest passwords can pose a risk if they’re the only thing standing between your users and enterprise content.

article thumbnail

ConnectWise Quietly Patches Flaw That Helps Phishers

Krebs on Security

“Our team quickly triaged the report and determined the risk to partners to be minimal,” said Patrick Beggs , ConnectWise’s chief information security officer. “Nevertheless, the mitigation was simple and presented no risk to partner experience, so we put it into the then-stable 22.8 Update, 7:25 p.m.

Phishing 251